Abstract: This paper examines the factors, which determine
R&D outsourcing behaviour at Japanese firms, from the viewpoints of
transaction cost and strategic management, since the latter half of the
1990s. This study uses empirical analysis, which involves the
application of large-sample data. The principal findings of this paper
are listed below. Firms that belong to a wider corporate group are more
active in executing R&D outsourcing activities. Diversification
strategies such as the expansion of product and sales markets have a
positive effect on the R&D outsourcing behaviour of firms. Moreover,
while quantitative R&D resources have positive influences on R&D
outsourcing, qualitative indices have no effect. These facts suggest
that R&D outsourcing behaviour of Japanese firms are consistent with
the two perspectives of transaction cost and strategic management.
Specifically, a conventional corporate group network plays an
important role in R&D outsourcing behaviour. Firms that execute
R&D outsourcing leverage 'old' networks to construct 'new' networks
and use both networks properly.
Abstract: An ontology is a data model that represents a set of
concepts in a given field and the relationships among those concepts.
As the emphasis on achieving a semantic web continues to escalate,
ontologies for all types of domains increasingly will be developed.
These ontologies may become large and complex, and as their size
and complexity grows, so will the need for multi-user interfaces for
ontology curation. Herein a functionally comprehensive, generic
approach to maintaining an ontology as a relational database is
presented. Unlike many other ontology editors that utilize a database,
this approach is entirely domain-generic and fully supports Webbased,
collaborative editing including the designation of different
levels of authorization for users.
Abstract: In order to obtaining the dynamic evolution image of Tungsten array for foam padding, and to research the form of interaction between Tungsten plasma and foam column, a shadow imaging system of four-frame ultraviolet probe laser (266nm)has been designed on 1MA pulse power device. The time resolution of the system is 2.5ns, and static space resolution is superior to 70μm. The radial shadowgraphy image reveals the whole process from the melting and expansion of solid wire to the interaction of the precursor plasma and the foam, from the pinch to rebound inflation. The image shows the continuous interaction of Tungsten plasma and foam in a form of “Raining" within a time of about 50ns, the plasma shell structure has not been found in the whole period of pinch. The quantitative analysis indicates the minimum pinching speed of the foam column is 1.0×106cm/s, and maximum pinching speed is 6.0×106cm/s, and the axial stagnation diameter is approx 1mm.
Abstract: Artemisinin is a potential antimalarial drug effective
against the multidrug resistant forms of Malarial Parasites. The
current production of artemisinin is insufficient to meet the global
demand. In the present study microbial biotransformation of
arteannuin B, a biogenetic precursor of artemisinin to the later has
been investigated. Screening studies carried out on several soil borne
microorganisms have yielded one novel species with the
bioconversion ability. Crude cell free extract of 72h old culture of the
isolate had shown the bioconversion activity. On incubation with the
substrate arteannuin B, crude cell free extract of the isolate had
shown a bioconversion of 18.54% to artemisinin on molar basis with
a specific activity of 0.18 units/mg.
Abstract: New software protection product called “Obfuscation
Studio" is presented in the paper. Several obfuscating modules that
are already implemented are described. Some theoretical data is
presented, that shows the potency and effectiveness of described
obfuscation methods. “Obfuscation Studio" is being implemented for
protecting programs written for .NET platform, but the described
methods can also be interesting for other applications.
Abstract: IPsec protocol[1] is a set of security extensions
developed by the IETF and it provides privacy and authentication
services at the IP layer by using modern cryptography. In this paper,
we describe both of H/W and S/W architectures of our router system,
SRS-10. The system is designed to support high performance routing
and IPsec VPN. Especially, we used Cavium-s CN2560 processor to
implement IPsec processing in inline-mode.
Abstract: Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.
Abstract: In this paper we introduce a new unit test technique
called déjà-vu object. Déjà-vu objects replace real objects used by
classes under test, allowing the execution of isolated unit tests. A
déjà-vu object is able to observe and record the behaviour of a real
object during real sessions, and to replace it during unit tests,
returning previously recorded results. Consequently déjà-vu object
technique can be useful when a bottom-up development and testing
strategy is adopted. In this case déjà-vu objects can increase test
portability and test source code readability. At the same time they
can reduce the time spent by programmers to develop test code and
the risk of incompatibility during the switching between déjà-vu and
production code.
Abstract: The electric power industry is currently undergoing an unprecedented reform. One of the most exciting and potentially profitable recent developments is increasing usage of artificial intelligence techniques. The intention of this paper is to give an overview of using neural network (NN) techniques in power systems. According to the growth rate of NNs application in some power system subjects, this paper introduce a brief overview in fault diagnosis, security assessment, load forecasting, economic dispatch and harmonic analyzing. Advantages and disadvantages of using NNs in above mentioned subjects and the main challenges in these fields have been explained, too.
Abstract: In electronegative-electropositive gas mixtures plasma, at a total pressure varying in the range of ten to hundred Torr, the appearance of a quasi-mochromatization effect of the emitted radiation was reported. This radiation could be the result of the generating mechanisms at molecular level, which is the case of the excimer radiation but also at atomic level. Thus, in the last case, in (Ne+1%Ar/Xe+H2) gas mixtures plasma in a dielectric barrier discharge, this effect, called M-effect, consists in the reduction of the discharge emission spectrum practice at one single, strong spectral line with λ = 585.3 nm. The present paper is concerned with the characteristics comparative investigation of the principal reaction mechanisms involved in the quasi-monochromatization effect existence in the case of the excimer radiation, respectively of the Meffect. Also, the paper points out the role of the metastable electronegative atoms in the appearance of the monochromatization – effect at atomic level.
Abstract: In this paper, we propose a new robust and secure
system that is based on the combination between two different
transforms Discrete wavelet Transform (DWT) and Contourlet
Transform (CT). The combined transforms will compensate the
drawback of using each transform separately. The proposed
algorithm has been designed, implemented and tested successfully.
The experimental results showed that selecting the best sub-band for
embedding from both transforms will improve the imperceptibility
and robustness of the new combined algorithm. The evaluated
imperceptibility of the combined DWT-CT algorithm which gave a
PSNR value 88.11 and the combination DWT-CT algorithm
improves robustness since it produced better robust against Gaussian
noise attack. In addition to that, the implemented system shored a
successful extraction method to extract watermark efficiently.
Abstract: This paper employs a the variable returns to scale DEA
model to take account of risky assets and estimate the operating
efficiencies for the 21 domestic listed securities firms during the
period 2005-2009. Evidence is found that on average the brokerage
securities firms- operating efficiencies are better than integrated
securities firms. Evidence is also found that the technical inefficiency
from inappropriate management constitutes the main source of the
operating inefficiency for both types of securities firms. Moreover, the
scale economies prevail in brokerage and integrated securities firms,
in other words, which exhibit the characteristic of increasing returns to
scale.
Abstract: The transition to sustainable development requires
considerable investments from stakeholders, both financial and
immaterial. However, accounting for such investments often poses a
challenge, as ventures with intangible or non-financial returns remain
oblivious to conventional accounting techniques and risk assessment.
That such investments may significantly contribute to the welfare of
those affected may act as a driving force behind attempting to bridge
this gap. This gains crucial importance as investments must be also
backed by governments and administrations; entities whose budget
depends on taxpayers- contributions and whose tasks are based on
securing the welfare of their citizens. Besides economic welfare,
citizens also require social and environmental wellbeing too.
However, administrations must also safeguard that welfare is
guaranteed not only to present, but to future generations too. With
already strained budgets and the requirement of sustainable
development, governments on all levels face the double challenge of
making both of these ends meet.
Abstract: Nowadays increasingly the population makes use of
Information Technology (IT). As such, in recent year the Portuguese
government increased its focus on using the IT for improving
people-s life and began to develop a set of measures to enable the
modernization of the Public Administration, and so reducing the gap
between Public Administration and citizens.Thus the Portuguese
Government launched the Simplex Program. However these
SIMPLEX eGov measures, which have been implemented over the
years, present a serious challenge: how to forecast its impact on
existing Information Systems Architecture (ISA). Thus, this research
is focus in addressing the problem of automating the evaluation of the
actual impact of implementation an eGovSimplification and
Modernization measures in the Information Systems Architecture. To
realize the evaluation we proposes a Framework, which is supported
by some key concepts as: Quality Factors, ISA modeling,
Multicriteria Approach, Polarity Profile and Quality Metrics
Abstract: The present study has been conducted to characterize
the prophenoloxidase (PPO) system of the desert locust, Schistocerca
gregaria following injection of Bacillus thuringiensis kurstaki (Bt).
The bulk of PPO system was associated with haemocytes and a little
amount was found in plasma. This system was activated by different
activators such as laminarin, lipopolysaccharide (LPS) and trypsin
suggesting that the stimulatory mechanism may involve an enzyme
cascade of one or more associated molecules. These activators did
not activate all the molecules of the cascade. Presence of
phenoloxidase activity (PO) coincides with the appearance of protein
band with molecular weight (MW) 70.154 KD (Kilo Dalton).
Abstract: Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.
Abstract: The development of information and communication
technology, the increased use of the internet, as well as the effects of
the recession within the last years, have lead to the increased use of
cloud computing based solutions, also called on-demand solutions.
These solutions offer a large number of benefits to organizations as
well as challenges and risks, mainly determined by data visualization
in different geographic locations on the internet. As far as the specific
risks of cloud environment are concerned, data security is still
considered a peak barrier in adopting cloud computing. The present
study offers an approach upon ensuring the security of cloud data,
oriented towards the whole data life cycle. The final part of the study
focuses on the assessment of data security in the cloud, this
representing the bases in determining the potential losses and the
premise for subsequent improvements and continuous learning.
Abstract: Security risk models have been successful in estimating the likelihood of attack for simple security threats. However, modeling complex system and their security risk is even a challenge. Many methods have been proposed to face this problem. Often difficult to manipulate, and not enough all-embracing they are not as famous as they should with administrators and deciders. We propose in this paper a new tool to model big systems on purpose. The software, takes into account attack threats and security strength.
Abstract: There are various overlay structures that provide
efficient and scalable solutions for point and range query in a peer-topeer
network. Overlay structure based on m-Binary Search Tree
(BST) is one such popular technique. It deals with the division of the
tree into different key intervals and then assigning the key intervals to
a BST. The popularity of the BST makes this overlay structure
vulnerable to different kinds of attacks. Here we present four such
possible attacks namely index poisoning attack, eclipse attack,
pollution attack and syn flooding attack. The functionality of BST is
affected by these attacks. We also provide different security
techniques that can be applied against these attacks.
Abstract: This article is dedicated to development of
mathematical models for determining the dynamics of
concentration of hazardous substances in urban turbulent
atmosphere. Development of the mathematical models implied
taking into account the time-space variability of the fields of
meteorological items and such turbulent atmosphere data as vortex
nature, nonlinear nature, dissipativity and diffusivity. Knowing the
turbulent airflow velocity is not assumed when developing the
model. However, a simplified model implies that the turbulent and
molecular diffusion ratio is a piecewise constant function that
changes depending on vertical distance from the earth surface.
Thereby an important assumption of vertical stratification of urban
air due to atmospheric accumulation of hazardous substances
emitted by motor vehicles is introduced into the mathematical
model. The suggested simplified non-linear mathematical model of
determining the sought exhaust concentration at a priori unknown
turbulent flow velocity through non-degenerate transformation is
reduced to the model which is subsequently solved analytically.